1 /* $NetBSD: chpass_c.c,v 1.2 2017/01/28 21:31:49 christos Exp $ */ 2 3 /* 4 * Copyright (c) 1997-2000, 2005-2006 Kungliga Tekniska Högskolan 5 * (Royal Institute of Technology, Stockholm, Sweden). 6 * All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 19 * 3. Neither the name of the Institute nor the names of its contributors 20 * may be used to endorse or promote products derived from this software 21 * without specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33 * SUCH DAMAGE. 34 */ 35 36 #include "kadm5_locl.h" 37 38 __RCSID("$NetBSD: chpass_c.c,v 1.2 2017/01/28 21:31:49 christos Exp $"); 39 40 kadm5_ret_t 41 kadm5_c_chpass_principal(void *server_handle, 42 krb5_principal princ, 43 int keepold, 44 int n_ks_tuple, 45 krb5_key_salt_tuple *ks_tuple, 46 const char *password) 47 { 48 kadm5_client_context *context = server_handle; 49 kadm5_ret_t ret; 50 krb5_storage *sp; 51 unsigned char buf[1024]; 52 int32_t tmp; 53 krb5_data reply; 54 55 /* 56 * We should get around to implementing this... At the moment, the 57 * the server side API is implemented but the wire protocol has not 58 * been updated. 59 */ 60 if (n_ks_tuple > 0) 61 return KADM5_KS_TUPLE_NOSUPP; 62 63 ret = _kadm5_connect(server_handle); 64 if(ret) 65 return ret; 66 67 sp = krb5_storage_from_mem(buf, sizeof(buf)); 68 if (sp == NULL) { 69 krb5_clear_error_message(context->context); 70 return ENOMEM; 71 } 72 krb5_store_int32(sp, kadm_chpass); 73 krb5_store_principal(sp, princ); 74 krb5_store_string(sp, password); 75 krb5_store_int32(sp, keepold); /* extension */ 76 ret = _kadm5_client_send(context, sp); 77 krb5_storage_free(sp); 78 if (ret) 79 return ret; 80 ret = _kadm5_client_recv(context, &reply); 81 if(ret) 82 return ret; 83 sp = krb5_storage_from_data (&reply); 84 if (sp == NULL) { 85 krb5_clear_error_message(context->context); 86 krb5_data_free (&reply); 87 return ENOMEM; 88 } 89 krb5_ret_int32(sp, &tmp); 90 krb5_clear_error_message(context->context); 91 krb5_storage_free(sp); 92 krb5_data_free (&reply); 93 return tmp; 94 } 95 96 kadm5_ret_t 97 kadm5_c_chpass_principal_with_key(void *server_handle, 98 krb5_principal princ, 99 int keepold, 100 int n_key_data, 101 krb5_key_data *key_data) 102 { 103 kadm5_client_context *context = server_handle; 104 kadm5_ret_t ret; 105 krb5_storage *sp; 106 unsigned char buf[1024]; 107 int32_t tmp; 108 krb5_data reply; 109 int i; 110 111 ret = _kadm5_connect(server_handle); 112 if(ret) 113 return ret; 114 115 sp = krb5_storage_from_mem(buf, sizeof(buf)); 116 if (sp == NULL) { 117 krb5_clear_error_message(context->context); 118 return ENOMEM; 119 } 120 krb5_store_int32(sp, kadm_chpass_with_key); 121 krb5_store_principal(sp, princ); 122 krb5_store_int32(sp, n_key_data); 123 for (i = 0; i < n_key_data; ++i) 124 kadm5_store_key_data (sp, &key_data[i]); 125 krb5_store_int32(sp, keepold); /* extension */ 126 ret = _kadm5_client_send(context, sp); 127 krb5_storage_free(sp); 128 if (ret) 129 return ret; 130 ret = _kadm5_client_recv(context, &reply); 131 if(ret) 132 return ret; 133 sp = krb5_storage_from_data (&reply); 134 if (sp == NULL) { 135 krb5_clear_error_message(context->context); 136 krb5_data_free (&reply); 137 return ENOMEM; 138 } 139 krb5_ret_int32(sp, &tmp); 140 krb5_clear_error_message(context->context); 141 krb5_storage_free(sp); 142 krb5_data_free (&reply); 143 return tmp; 144 } 145